Correlation immunity

from Wikipedia, the free encyclopedia

The correlation immunity is a measure of whether and how much information can be drawn from the function value of a Boolean function about its arguments.

In cryptography , it shows how resistant a Boolean function is to correlation attacks. The concept of correlation immunity for Boolean functions was first defined by Siegenthaler.

definition

Let be a Boolean function and be binary independent and identically distributed random variables that represent the arguments for . A function is correlation-immune of order if and only if the function value is statistically independent of the input values , specifically for each selection from indices (or less) with . The statement that the mutual information of the or fewer input values and the function value is equal to 0 is directly equivalent to this

If the function is also evenly distributed, that is , then it is called -resilient.

But this necessary condition only says whether a function is correlation immune or not. It would be better to find a value for a function that indicates the level of immunity. This is exactly what is required for the definition of the Siegenthaler bound .

Trade-off between correlation immunity and degree of

In addition to defining correlation immunity, Siegenthaler also gives an important trade-off between correlation immunity and the degree of a function . If correlation-immune of order is , the degree of . If it is also evenly distributed, i.e. -resilient, then the degree of is even .

This means that the correlation immune functions of the highest order always have a small degree. For example, -resilient functions are always of degree 1 or less, i.e. linear or affine .

swell

  1. ^ T. Siegenthaler: Correlation immunity of nonlinear combining functions for cryptographic applications (Corresp.) . In: IEEE Transactions on Information Theory . tape 30 , no. 5 , September 1984, ISSN  0018-9448 , pp. 776-780 , doi : 10.1109 / tit.1984.1056949 ( ieee.org [accessed February 14, 2018]).
  2. ^ B. Chor, O. Goldreich, J. Hasted, J. Freidmann, S. Rudich: The bit extraction problem or t-resilient functions . In: 26th Annual Symposium on Foundations of Computer Science (sfcs 1985) . October 1985, p. 396-407 , doi : 10.1109 / SFCS.1985.55 ( ieee.org [accessed February 14, 2018]).

Web links